Study of remote user authentication using smart cards

碩士 === 淡江大學 === 資訊工程學系碩士班 === 100 === Smart card, also called IC card or chip card, was first invented by the German scientists Jurgen Dethloff and Helmut Grotrupp, who added the identity card with integrated circuits and obtained a patent in the same year. In 1975, the French company CII-Honeywell...

Full description

Bibliographic Details
Main Authors: Chao-Sheng Liu, 劉昭聖
Other Authors: Wen-Bing Horng
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/46597956218959899829
id ndltd-TW-100TKU05392041
record_format oai_dc
spelling ndltd-TW-100TKU053920412015-10-13T21:27:34Z http://ndltd.ncl.edu.tw/handle/46597956218959899829 Study of remote user authentication using smart cards 利用智慧卡做網路使用者認證之研究 Chao-Sheng Liu 劉昭聖 碩士 淡江大學 資訊工程學系碩士班 100 Smart card, also called IC card or chip card, was first invented by the German scientists Jurgen Dethloff and Helmut Grotrupp, who added the identity card with integrated circuits and obtained a patent in the same year. In 1975, the French company CII-Honeywell Bull produced the first credit card that was like ID card. In the same year, French scientists Roland Moreno obtained the patent of IC card in French. In 1976, the French computer company Bull produced the products of IC card first and began to apply in various areas, just like E-purse, IC debit card, credit card, easy card, national health insurance IC card, natural person''s evidence and so on. Since the data of smart card will transmit over the Internet, there are some problems to cope with. For example, the transmission of data channels is unsafe; it is easy to be monitored or intercepted the user’s data by the attacker or to perform some of the Internet attacks, like replay attack, masquerade attack, man-in-the-middle attack, and so on. Furthermore, the data stored in smart card can be retrieved by the attacker to launch other attacks, resulting unsafe transactions. Although many scholars proposed their method to improve the security of authentication schemes, there are some weaknesses found by other scholars. Hence, improvements of security of authentication schemes become an endless cycle. In this thesis, we propose an authentication scheme to improve other methods proposed by other scholars. We assume that the data stored in smart card can be obtained by the attacker, and our scheme can resist various attacks. Wen-Bing Horng 洪文斌 2012 學位論文 ; thesis 80 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 淡江大學 === 資訊工程學系碩士班 === 100 === Smart card, also called IC card or chip card, was first invented by the German scientists Jurgen Dethloff and Helmut Grotrupp, who added the identity card with integrated circuits and obtained a patent in the same year. In 1975, the French company CII-Honeywell Bull produced the first credit card that was like ID card. In the same year, French scientists Roland Moreno obtained the patent of IC card in French. In 1976, the French computer company Bull produced the products of IC card first and began to apply in various areas, just like E-purse, IC debit card, credit card, easy card, national health insurance IC card, natural person''s evidence and so on. Since the data of smart card will transmit over the Internet, there are some problems to cope with. For example, the transmission of data channels is unsafe; it is easy to be monitored or intercepted the user’s data by the attacker or to perform some of the Internet attacks, like replay attack, masquerade attack, man-in-the-middle attack, and so on. Furthermore, the data stored in smart card can be retrieved by the attacker to launch other attacks, resulting unsafe transactions. Although many scholars proposed their method to improve the security of authentication schemes, there are some weaknesses found by other scholars. Hence, improvements of security of authentication schemes become an endless cycle. In this thesis, we propose an authentication scheme to improve other methods proposed by other scholars. We assume that the data stored in smart card can be obtained by the attacker, and our scheme can resist various attacks.
author2 Wen-Bing Horng
author_facet Wen-Bing Horng
Chao-Sheng Liu
劉昭聖
author Chao-Sheng Liu
劉昭聖
spellingShingle Chao-Sheng Liu
劉昭聖
Study of remote user authentication using smart cards
author_sort Chao-Sheng Liu
title Study of remote user authentication using smart cards
title_short Study of remote user authentication using smart cards
title_full Study of remote user authentication using smart cards
title_fullStr Study of remote user authentication using smart cards
title_full_unstemmed Study of remote user authentication using smart cards
title_sort study of remote user authentication using smart cards
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/46597956218959899829
work_keys_str_mv AT chaoshengliu studyofremoteuserauthenticationusingsmartcards
AT liúzhāoshèng studyofremoteuserauthenticationusingsmartcards
AT chaoshengliu lìyòngzhìhuìkǎzuòwǎnglùshǐyòngzhěrènzhèngzhīyánjiū
AT liúzhāoshèng lìyòngzhìhuìkǎzuòwǎnglùshǐyòngzhěrènzhèngzhīyánjiū
_version_ 1718064098202091520